Search Results - (( _ application server algorithm ) OR ( mobile application a algorithm ))*

Refine Results
  1. 1

    A framework of rough cultural algorithms in optimizing mobile web caching performance by Sulaiman, Sarina, Shamsuddin, Siti Maryam, Abraham, Ajith, Sulaiman, Shahida

    Published 2007
    “…The common cause of poor performance is due to the direct access to the server (e.g. pitiable performance of server-side applications or during burst crowds) and network infrastructure (e.g. long geographical distances, network overloads, etc.). …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4
  5. 5

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Process state synchronization for mobility support in mobile cloud computing / Ejaz Ahmed by Ejaz, Ahmed

    Published 2016
    “…Mobile Cloud Computing (MCC) enables the resource-constrained mobile devices to execute the compute-intensive mobile applications either in client/server model or through cyber foraging of the tasks to the cloud servers. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We used a Drebin data sample, which is a collection of 5,560 applications, as well as clean data sample containing 1,846 applications. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12
  13. 13

    ABC-PSO for vertical handover in heterogeneous wireless networks by Goudarzi, Shidrokh, Hassan, Wan Haslina, Anisi, Mohammad Hossein, Soleymani, Seyed Ahmad, Sookhak, Mehdi, Khan, Muhammad Khurram, Hassan Abdalla Hashim, Aisha, Zareei, Mahdi

    Published 2017
    “…Cloud computing is currently emerging quickly as a client-server technology structure and, currently, providing distributed service applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms by Hydara, Isatou

    Published 2024
    “…Cross-site scripting (XSS) vulnerabilities are a major security threat for both desktop and mobile web applications. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Home intruder detection system using machine learning and IoT by Sahlan, Fadhluddin, Feizal, Faeez Zimam, Mansor, Hafizah

    Published 2022
    “…The main objectives of HIDES are to create a reliable home security system with the implementation of IoT, to implement the object detection algorithm to determine the presence of humans, and to develop a smart mobile application for users to monitor their houses from anywhere in the world and be alerted if any threats are detected. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Automated multi-factor analytics for cheat-proofing attendance-taking by Tachmammedov, S., Hooi, Y.K., Kalid, K.S.

    Published 2018
    “…A potential application of smartphone is as a tool to prevent attendance cheating. …”
    Get full text
    Get full text
    Article
  20. 20